Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-10-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
daae9ef5569b1a800270b09adb162b719f77c0594a792c78220074945a1b9a9d.dll
Resource
win7-20240903-en
General
-
Target
daae9ef5569b1a800270b09adb162b719f77c0594a792c78220074945a1b9a9d.dll
-
Size
964KB
-
MD5
0dfedfa7857af79c50d589c2dc966f39
-
SHA1
f60eb9042e405ccc3065b64cbae1e8f069c85edc
-
SHA256
daae9ef5569b1a800270b09adb162b719f77c0594a792c78220074945a1b9a9d
-
SHA512
1821ce0b21df31b09011fe9852b10de17fd0c440ba861cbec712206c6a9663a5d49302acb70cff9d79cd532a18feb0dffe179253ee9f49156f479de43ea37ebf
-
SSDEEP
12288:xfndx6M581WsGRouyjzC6gn5l0H1Tak8jnGg/xeq7gz3xfsPEb4skZIy:RdAE81W381Wk8jnYz3dsPEb4s9
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1244-4-0x0000000002E00000-0x0000000002E01000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2420-0-0x0000000140000000-0x00000001400F1000-memory.dmp dridex_payload behavioral1/memory/1244-24-0x0000000140000000-0x00000001400F1000-memory.dmp dridex_payload behavioral1/memory/1244-36-0x0000000140000000-0x00000001400F1000-memory.dmp dridex_payload behavioral1/memory/1244-35-0x0000000140000000-0x00000001400F1000-memory.dmp dridex_payload behavioral1/memory/2420-44-0x0000000140000000-0x00000001400F1000-memory.dmp dridex_payload behavioral1/memory/2632-54-0x0000000140000000-0x00000001400F2000-memory.dmp dridex_payload behavioral1/memory/2632-58-0x0000000140000000-0x00000001400F2000-memory.dmp dridex_payload behavioral1/memory/3052-71-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_payload behavioral1/memory/3052-75-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_payload behavioral1/memory/2908-91-0x0000000140000000-0x00000001400F2000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2632 msconfig.exe 3052 dpnsvr.exe 2908 BitLockerWizard.exe -
Loads dropped DLL 7 IoCs
pid Process 1244 Process not Found 2632 msconfig.exe 1244 Process not Found 3052 dpnsvr.exe 1244 Process not Found 2908 BitLockerWizard.exe 1244 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rcoehfpd = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\acZ\\dpnsvr.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpnsvr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found 1244 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2896 1244 Process not Found 31 PID 1244 wrote to memory of 2896 1244 Process not Found 31 PID 1244 wrote to memory of 2896 1244 Process not Found 31 PID 1244 wrote to memory of 2632 1244 Process not Found 32 PID 1244 wrote to memory of 2632 1244 Process not Found 32 PID 1244 wrote to memory of 2632 1244 Process not Found 32 PID 1244 wrote to memory of 1828 1244 Process not Found 33 PID 1244 wrote to memory of 1828 1244 Process not Found 33 PID 1244 wrote to memory of 1828 1244 Process not Found 33 PID 1244 wrote to memory of 3052 1244 Process not Found 34 PID 1244 wrote to memory of 3052 1244 Process not Found 34 PID 1244 wrote to memory of 3052 1244 Process not Found 34 PID 1244 wrote to memory of 1088 1244 Process not Found 35 PID 1244 wrote to memory of 1088 1244 Process not Found 35 PID 1244 wrote to memory of 1088 1244 Process not Found 35 PID 1244 wrote to memory of 2908 1244 Process not Found 36 PID 1244 wrote to memory of 2908 1244 Process not Found 36 PID 1244 wrote to memory of 2908 1244 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daae9ef5569b1a800270b09adb162b719f77c0594a792c78220074945a1b9a9d.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵PID:2896
-
C:\Users\Admin\AppData\Local\U1uf\msconfig.exeC:\Users\Admin\AppData\Local\U1uf\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2632
-
C:\Windows\system32\dpnsvr.exeC:\Windows\system32\dpnsvr.exe1⤵PID:1828
-
C:\Users\Admin\AppData\Local\0jhS7f\dpnsvr.exeC:\Users\Admin\AppData\Local\0jhS7f\dpnsvr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3052
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:1088
-
C:\Users\Admin\AppData\Local\r8L3S7Kr\BitLockerWizard.exeC:\Users\Admin\AppData\Local\r8L3S7Kr\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
972KB
MD52dd7a5b9e0622945e27ea3a36470a920
SHA18bfad65483101b23d30b258899326afb2ddbafa8
SHA25695b8a01fa91b9ce3f0eb87d8663e9a430e3483dfd37d346fa16f06821849f754
SHA512fb324a8dd5b70e41bec66a2c3cf0cffa845ce49fa91317efb75a6176df75ada4a7f2a1409acd34b8cf0461e260975a1e7aa99d2b75e12d885361c2a6a8d1a537
-
Filesize
33KB
MD56806b72978f6bd27aef57899be68b93b
SHA1713c246d0b0b8dcc298afaed4f62aed82789951c
SHA2563485ee4159c5f9e4ed9dd06e668d1e04148154ff40327a9ccb591e8c5a79958c
SHA51243c942358b2e949751149ecc4be5ff6cb0634957ff1128ad5e6051e83379fb5643100cae2f6ef3eaf36aff016063c150e93297aa866e780d0e4d51656a251c7b
-
Filesize
968KB
MD5797592a888c990514baa8284eab3ebfd
SHA1117263ea16c1a2fb3980c352148a822149cc5c4d
SHA2562fdcf3df797ff058afe5312d057d1b67a68fbb45edaf3d2cf8a4d0a511481ac9
SHA512fa5b5a04f0fe35959929b9f215e3600372299444eaed2266ceaaa056a4531ebb4acea73a0d412a6af5f871aa7a16b06099051e6bb901d9841ea8187f64aadaa3
-
Filesize
98KB
MD508a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9
-
Filesize
968KB
MD5e49a9417b363a96ed32698f1a08f4d56
SHA1051f16697ccab2c465ab4d711bd4e22dfd4170a0
SHA2563fe62bcd6a550a9fb3d99d02eed486926b3715fa1fed23ba149bdca6e85b556b
SHA512df90c343e4a22488260ff80ed242ad5ee1290a42518f061a9d48d256687dc660fee63d6831c4f208ae624c0aa433a6f8f3fb74133501ce2d935568c7d2625b4e
-
Filesize
1KB
MD50253e5c3da492b254027cea8744588a8
SHA14b9a4c89f2f870b18cbf9a20f3d069f0ece69941
SHA2563abeed39e79af2057c9e0b36be7f341847fd6424944f6899d2f9f77ff33f3bd0
SHA5122b466a77d0eba9b30844e200fe92de68ba0f7ba06fc93697dafb83ee65f0975ef96bd9ebec1c126e6d580b630ed613547e5619a7e39d688916104cab63f2b30f
-
Filesize
293KB
MD5e19d102baf266f34592f7c742fbfa886
SHA1c9c9c45b7e97bb7a180064d0a1962429f015686d
SHA256f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1
SHA5121b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283